default search action
ACM Transactions on Information and System Security (TISSEC), Volume 11
Volume 11, Number 1, February 2008
- Indrakshi Ray:
Editorial. 1:1 - Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
The Traust Authorization Service. 2:1-2:33 - Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
Toward a Usage-Based Security Framework for Collaborative Computing Systems. 3:1-3:36 - Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
XACML Policy Integration Algorithms. 4:1-4:29
Volume 11, Number 2, May 2008
- Jooyoung Lee, Douglas R. Stinson:
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs. 1:1-1:35 - Chad D. Mano, Andrew Blaich, Qi Liao, Yingxin Jiang, David A. Cieslak, David Salyers, Aaron Striegel:
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning. 2:1-2:23 - Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems. 3:1-3:34 - Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption. 4:1-4:44 - HweeHwa Pang, Kian-Lee Tan:
Verifying Completeness of Relational Query Answers from Online Servers. 5:1-5:50 - Felix Brandt, Tuomas Sandholm:
On the Existence of Unconditionally Privacy-Preserving Auction Protocols. 6:1-6:21
Volume 11, Number 3, March 2008
- Gene Tsudik:
Editorial. 11:1 - Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. 12:1-12:37 - Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Redoubtable Sensor Networks. 13:1-13:22 - Katharine Chang, Kang G. Shin:
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. 14:1-14:35 - Liang Xie, Sencun Zhu:
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. 15:1-15:30 - Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Noninvasive Methods for Host Certification. 16:1-16:23
Volume 11, Number 4, July 2008
- Gildas Avoine, Pascal Junod, Philippe Oechslin:
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables. 17:1-17:22 - Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. 18:1-18:43 - Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos:
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks. 19:1-19:28 - Young U. Ryu, Hyeun-Suk Rhee:
Evaluation of Intrusion Detection Systems Under a Resource Constraint. 20:1-20:24 - Joseph Y. Halpern, Vicky Weissman:
Using First-Order Logic to Reason about Policies. 21:1-21:41 - Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. 22:1-22:39 - Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava:
Secure Time Synchronization in Sensor Networks. 23:1-23:35
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.